Results 21 to 30 of about 755,843 (383)

The Effect of Text Summarization in Essay Scoring (Case Study: Teach on E-Learning)

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2022
The development of automated essay scoring (AES) in the neural network (NN) approach has eliminated feature engineering. However, feature engineering is still needed, moreover, data with labels in the form of rubric scores, which are complementary to AES
Sensa Gudya Sauma Syahra   +2 more
doaj   +1 more source

Reducing the Cost of Implementing AES as a Quantum Circuit

open access: yesIEEE Transactions on Quantum Engineering, 2020
To quantify security levels in a postquantum scenario, it is common to use the quantum resources needed to attack the Advanced Encryption Standard (AES) as a reference value.
Brandon Langenberg   +2 more
semanticscholar   +1 more source

Implementing AES Encryption on Programmable Switches via Scrambled Lookup Tables

open access: yesSPIN@SIGCOMM, 2020
AES is a symmetric encryption algorithm widely used in many applications. An AES implementation in the data plane can help us build in-network security and privacy applications, such as IP header encryption or onion routing.
Xiaoqi Chen
semanticscholar   +1 more source

Acute encephalitis syndrome surveillance, Kushinagar district, Uttar Pradesh, India, 2011-2012 [PDF]

open access: yes, 2013
In India, quality surveillance for acute encephalitis syndrome (AES), including laboratory testing, is necessary for understanding the epidemiology and etiology of AES, planning interventions, and developing policy.
Arunachalam   +20 more
core   +1 more source

The price of tumor control: an analysis of rare side effects of anti-CTLA-4 therapy in metastatic melanoma from the ipilimumab network [PDF]

open access: yes, 2013
Background: Ipilimumab, a cytotoxic T-lymphocyte antigen-4 (CTLA-4) blocking antibody, has been approved for the treatment of metastatic melanoma and induces adverse events (AE) in up to 64% of patients.
A Bashey   +88 more
core   +4 more sources

C sp2/sp3 hybridisations in carbon nanomaterials – XPS and (X)AES study

open access: yesApplications of Surface Science, 2018
Shape of the C KLL (KVV) Auger spectrum provides a measure of C sp2/sp3 hybridisations, alternative to C 1s spectra fitting. Due to a smaller kinetic energy of C KLL electrons than C 1s photoelectrons the investigated information depths are attributed to
B. Lesiak   +6 more
semanticscholar   +1 more source

Secure Framework Enhancing AES Algorithm in Cloud Computing

open access: yesSecur. Commun. Networks, 2020
The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the ...
Ijaz Ahmad Awan   +5 more
semanticscholar   +1 more source

Hybrid Cryptography with a One–Time Stamp to Secure Contact Tracing for COVID–19 Infection

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2022
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner they live and work to the so-called new norm in social standards.
El-Douh Ahmed Abdel-Rahim   +3 more
doaj   +1 more source

The admission experience survey italian version (I-AES). a factor analytic study on a sample of 156 acute psychiatric in-patients [PDF]

open access: yes, 2019
Coercive treatments are often regarded as an inevitable and yet highly debated feature of psychiatric care. Perceived coercion is often reported by patients involuntarily committed as well as their voluntary counterparts. The Admission Experience Survey (
Biondi, Massimo   +6 more
core   +1 more source

Stacking battery energy storage revenues with enhanced service provision

open access: yesIET Smart Grid, 2019
Battery energy storage systems (BESSs) offer many desirable services from peak demand lopping/valley filling too fast power response services. These services can be scheduled so they enhance each other; in this manner, the inverter size is effectively ...
Paul Vincent Brogan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy